{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,23]],"date-time":"2025-02-23T05:15:39Z","timestamp":1740287739878,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":39,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642145964"},{"type":"electronic","value":"9783642145971"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14597-1_7","type":"book-chapter","created":{"date-parts":[[2010,7,9]],"date-time":"2010-07-09T13:50:13Z","timestamp":1278683413000},"page":"104-128","source":"Crossref","is-referenced-by-count":7,"title":["SocialClouds: Concept, Security Architecture and Some Mechanisms"],"prefix":"10.1007","author":[{"given":"Shouhuai","family":"Xu","sequence":"first","affiliation":[]},{"given":"Moti","family":"Yung","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Anderson, J., Diaz, C., Bonneau, J., Stajano, F.: Privacy-enabling social networking over untrusted networks. In: Proc. WOSN 2009, pp. 1\u20136 (2009)","DOI":"10.1145\/1592665.1592667"},{"key":"7_CR2","unstructured":"Armbrust, M., Fox, A., Griffith, R., Joseph, A., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: Above the clouds: A berkeley view of cloud computing. Technical Report UCB\/EECS-2009-28 (February 2009)"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: ACM CCS 2007 (2007)","DOI":"10.1145\/1315245.1315318"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Di Pietro, R., Mancini, L., Tsudik, G.: Scalable and efficient provable data possession. In: Proc. SecureComm 2008, pp. 1\u201310 (2008)","DOI":"10.1145\/1460877.1460889"},{"key":"7_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1007\/3-540-39200-9_38","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"M. Bellare","year":"2003","unstructured":"Bellare, M., Micciancio, D., Warinschi, B.: Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 614\u2013629. Springer, Heidelberg (2003)"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: Proc. ACM CCS 2003, pp. 62\u201373 (2003)","DOI":"10.1145\/168588.168596"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Berger, S., Caceres, R., Goldman, K., Pendarakis, D., Perez, R., Rao, J., Rom, E., Sailer, R., Schildhauer, W., Srinivasan, D., Tal, S., Valdez, E.: Security for the cloud infrastructure: Trusted virtual data center implementation. IBM Journal of Research and Development\u00a053(4)","DOI":"10.1147\/JRD.2009.5429060"},{"key":"7_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 213\u2013229. Springer, Heidelberg (2001)"},{"key":"7_CR9","unstructured":"Bowers, K., Juels, A., Oprea, A.: Hail: A high-availability and integrity layer for cloud storage, http:\/\/eprint.iacr.org\/"},{"key":"7_CR10","unstructured":"Bowers, K., Juels, A., Oprea, A.: Proofs of retrievability: Theory and implementation, http:\/\/eprint.iacr.org\/"},{"key":"7_CR11","unstructured":"Brodkin, J.: Gartner: Seven cloud-computing security risks, http:\/\/www.networkworld.com\/news\/2008\/070208-cloud.html (07\/02\/2008)"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Buchegger, S., Datta, A.: A case for P2P infrastructure for social networks - opportunities and challenges. In: WONS 2009 (2009)","DOI":"10.1109\/WONS.2009.4801862"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Buchegger, S., Schi\u00f6berg, D., Vu, L., Datta, A.: PeerSoN: P2P social networking - early experiences and insights. In: WOSN 2009 (2009)","DOI":"10.1145\/1578002.1578010"},{"key":"7_CR14","unstructured":"Chandra, A., Weissman, J.: Nebulas: Using Distributed Voluntary Resources to Build Clouds. In: Proc. HotCloud 2009 (2009)"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Chaum, D.: Blind signatures for untraceable payments. In: Proc. CRYPTO 1982 (1982)","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"7_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/3-540-46416-6_22","volume-title":"Advances in Cryptology - EUROCRYPT \u201991","author":"D. Chaum","year":"1991","unstructured":"Chaum, D., Van Heyst, E.: Group signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol.\u00a0547, pp. 257\u2013265. Springer, Heidelberg (1991)"},{"key":"7_CR17","unstructured":"Cramer, R.: Modular Design of Secure yet Practical Cryptographic Protocols (1997)"},{"key":"7_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1007\/3-540-48658-5_19","volume-title":"Advances in Cryptology - CRYPTO \u201994","author":"R. Cramer","year":"1994","unstructured":"Cramer, R., Damg\u00e5rd, I., Schoenmakers, B.: Proofs of partial knowledge and simplified design of witness hiding protocols. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol.\u00a0839, pp. 174\u2013187. Springer, Heidelberg (1994)"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Cutillo, L., Molva, R., Strufe, T.: Privacy preserving social networking through decentralization. In: WONS 2009 (2009)","DOI":"10.1109\/WONS.2009.4801860"},{"key":"7_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1007\/0-387-34805-0_28","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"Y. Desmedt","year":"1990","unstructured":"Desmedt, Y., Frankel, Y.: Threshold cryptosystems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 307\u2013315. Springer, Heidelberg (1990)"},{"key":"7_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/3-540-46035-7_5","volume-title":"Advances in Cryptology - EUROCRYPT 2002","author":"Y. Dodis","year":"2002","unstructured":"Dodis, Y., Katz, J., Xu, S., Yung, M.: Key-insulated public key cryptosystems. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.\u00a02332, pp. 65\u201382. Springer, Heidelberg (2002)"},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"Douceur, J.: The sybil attack. In: Proc. IPTPS 2001, pp. 251\u2013260 (2001)","DOI":"10.1007\/3-540-45748-8_24"},{"key":"7_CR23","series-title":"Lecture Notes in Computer Science","first-page":"186","volume-title":"Advances in Cryptology - CRYPTO \u201986","author":"A. Fiat","year":"1987","unstructured":"Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol.\u00a0263, pp. 186\u2013194. Springer, Heidelberg (1987)"},{"issue":"4","key":"7_CR24","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1145\/321906.321909","volume":"22","author":"O. Ibarra","year":"1975","unstructured":"Ibarra, O., Kim, C.: Fast approximation for the knapsack and sum of subset problems. Journal of ACM\u00a022(4), 463\u2013468 (1975)","journal-title":"Journal of ACM"},{"key":"7_CR25","unstructured":"Li, N., Mitchell, J., Winsborough, W.: Design of a role-based trust-management framework. In: Proc. IEEE Symposium on Security and Privacy, pp. 114\u2013130 (2002)"},{"key":"7_CR26","unstructured":"Marks, K.: Social web q&a with googles kevin marks (February 23, 2009), http:\/\/www.techcrunchit.com\/2009\/02\/23\/social-web-qa-with-googles-kevin-marks\/"},{"key":"7_CR27","doi-asserted-by":"crossref","unstructured":"Ostrovsky, R., Yung, M.: How to withstand mobile virus attacks (extended abstract). In: Proc. ACM Principles of Distributed Computing, pp. 51\u201359 (1991)","DOI":"10.1145\/112600.112605"},{"key":"7_CR28","doi-asserted-by":"crossref","unstructured":"Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, you, get off of my cloud! exploring information leakage in third-party compute clouds. In: CCS 2009 (2009)","DOI":"10.1145\/1653662.1653687"},{"key":"7_CR29","doi-asserted-by":"crossref","unstructured":"De Santis, A., Di Crescenzo, G., Persiano, G., Yung, M.: On monotone formula closure of SZK. In: Proc. 35th IEEE Symp. on Foundations of Comp. Science","DOI":"10.1109\/SFCS.1994.365745"},{"key":"7_CR30","unstructured":"Santos, N., Gummadi, K., Rodrigues, R.: Towards trusted cloud computing. In: Proc. HotCloud 2009 (2009)"},{"key":"7_CR31","doi-asserted-by":"crossref","unstructured":"Shakimov, A., Varshavsky, A., Cox, L., C\u00e1ceres, R.: Privacy, cost, and availability tradeoffs in decentralized osns. In: Proc. WOSN 2009, pp. 13\u201318 (2009)","DOI":"10.1145\/1592665.1592669"},{"key":"7_CR32","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. C. ACM\u00a022, 612\u2013613 (1979)","journal-title":"C. ACM"},{"key":"7_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A. Shamir","year":"1985","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 47\u201353. Springer, Heidelberg (1985)"},{"key":"7_CR34","doi-asserted-by":"crossref","unstructured":"Stutzbach, D., Rejaie, R.: Understanding churn in peer-to-peer networks. In: Proc. ACM Conference on Internet Measurement (IMC 2006), pp. 189\u2013202 (2006)","DOI":"10.1145\/1177080.1177105"},{"key":"7_CR35","unstructured":"TCG, https:\/\/www.trustedcomputinggroup.org\/"},{"key":"7_CR36","unstructured":"Wood, T., Shenoy, P., Gerber, A., Ramakrishnan, K., Van der Merwe, J.: The case for enterprise-ready virtual private clouds. In: Proc. HotCloud 2009 (2009)"},{"key":"7_CR37","doi-asserted-by":"crossref","unstructured":"Xu, S., Li, X., Parker, P.: Exploiting social networks for threshold signing: Attack-resilience vs. availability. In: Proc. ACM ASIACCS 2008, pp. 325\u2013336 (2008)","DOI":"10.1145\/1368310.1368358"},{"key":"7_CR38","unstructured":"Xu, S., Yung, M.: SocialClouds: Concept, Security Architecture and Some Mechanisms. Full version of the present paper, www.cs.utsa.edu\/~shxu"},{"key":"7_CR39","doi-asserted-by":"crossref","unstructured":"Yu, H., Kaminsky, M., Gibbons, P., Flaxman, A.: Sybilguard: defending against sybil attacks via social networks. In: Proc. ACM SIGCOMM 2006, pp. 267\u2013278 (2006)","DOI":"10.1145\/1159913.1159945"}],"container-title":["Lecture Notes in Computer Science","Trusted Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14597-1_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T20:13:08Z","timestamp":1740255188000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14597-1_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642145964","9783642145971"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14597-1_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}